Policies & Standards
Policies & Standards
This section includes all IT policies, guidelines, best practices, standards and service level agreements.
Search by Keyword
San José State's IT governance structure is organized using a top level advisory committee, sub-committees, and several representative technical and work teams. The top level is the IT Management Advisory Committee.
Information security is governed by SJSU’s Information Security Program [pdf] and Responsible Use Policy. To help safeguard and secure campus information, all users and departments are required to adhere to these policies and standards or to request an exception. Please report suspected violations, questions and comments to email@example.com.
These best practices help prevent inappropriate disclosure (intentional or accidental) of confidential information, which can lead to fraud or identity theft.
Information classification is the process of assigning value to information in order to organize it according to its risk to loss or harm from disclosure.
These standards are for technical staff and contractors and include information about wiring, quality assurance, products and installation standards.
These best practices include advice for using email, managing attachments, managing junk mail, and what to do when you're away from campus.
These best practices are for technical staff and include information about services that are prohibited and blocked (both inbound and outbound) on the campus perimeter firewall.
This protocol explains what to do if you discover an information or data security breach.
This program provides direction for managing and protecting the confidentiality, integrity and availability of SJSU information assets.
These agreements contain information for technical staff about submitting requests for new patch cord installations in campus network closets.
These best practices were implemented to minimize the number of software vulnerabilities on telecommunications and network-connected computer information systems.
This policy is intended to define, promote and encourage responsible use of CSU and campus information assets on the campuses and among members of the campus community.
Follow these guidelines to keep your computer safe and prevent it from becoming compromised.
This policy ensures users are aware of threats against systems and information and how to protect the confidentiality, integrity and availability of San José State data.
Device configurations for PC deskktop Workstations, Mac desktop workstations, mobile tablets, and monitors.
These guidelines describe student responsibilities in the use of their SJSU email accounts, and for reading and heeding email sent to them.
These standards are for technical staff and include information about the installation of telecommunications equipment on campus.
These standards are for technical staff and include information about the installation of telephones on campus.
These rules and policies define prohibitions and considerations for personal use of state telephones.
Specifications for the purchase of workstation hardware purchased by operational-fund, self-support and auxiliary units.